[SRU Bionic 0/5] CVE-2023-32233

Stefan Bader stefan.bader at canonical.com
Wed May 17 12:22:01 UTC 2023


On 17.05.23 14:18, Thadeu Lima de Souza Cascardo wrote:
> On Wed, May 17, 2023 at 02:13:17PM +0200, Stefan Bader wrote:
>> On 17.05.23 13:55, Thadeu Lima de Souza Cascardo wrote:
>>> On Wed, May 17, 2023 at 09:18:38AM +0200, Stefan Bader wrote:
>>>> On 16.05.23 15:53, Thadeu Lima de Souza Cascardo wrote:
>>>>> [Impact]
>>>>> On systems where user namespaces can be created by unprivileged users,
>>>>> which is the default configuration on Ubuntu, unprivileged users can
>>>>> trigger a use-after-free vulnerability on netfilter. This could be used to
>>>>> crash the system or elevate privileges.
>>>>>
>>>>> [Test case]
>>>>> A reproducer that causes an oops under slub_debug=FZP was tested and the fix
>>>>> has been shown to prevent it.
>>>>>
>>>>> [Backport]
>>>>> Picked patches submitted by the maintainer to 4.14 tree.
>>>>>
>>>>> [Potential impact]
>>>>> netfilter users may find regressions when manipulating nftables.
>>>>>
>>>>> Florian Westphal (1):
>>>>>      netfilter: nf_tables: split set destruction in deactivate and destroy
>>>>>        phase
>>>>>
>>>>> Pablo Neira Ayuso (4):
>>>>>      netfilter: nf_tables: unbind set in rule from commit path
>>>>>      netfilter: nf_tables: use-after-free in failing rule with bound set
>>>>>      netfilter: nf_tables: bogus EBUSY when deleting set after flush
>>>>>      netfilter: nf_tables: deactivate anonymous set from preparation phase
>>>>>
>>>>>     include/net/netfilter/nf_tables.h |  30 ++++++-
>>>>>     net/netfilter/nf_tables_api.c     | 139 +++++++++++++++++++++---------
>>>>>     net/netfilter/nft_dynset.c        |  22 ++++-
>>>>>     net/netfilter/nft_immediate.c     |   6 +-
>>>>>     net/netfilter/nft_lookup.c        |  21 ++++-
>>>>>     net/netfilter/nft_objref.c        |  21 ++++-
>>>>>     6 files changed, 193 insertions(+), 46 deletions(-)
>>>>>
>>>>
>>>> All patches seem to miss the cherry pick/backport line. As we probably also
>>>> should start handling bionic like ESM, maybe this should be re-submitted
>>>> with fixed provenance to the ESM list. Not NACKing straight to leave the
>>>> option for alternatives.
>>>> -- 
>>>> - Stefan
>>>>
>>>
>>> Provenance here is stated on the "[Upstream commit SHA1]" lines at the top,
>>> just like other fixes coming from upstream stable. As stated in the cover
>>> letter, these were picked as submitted by the maintainer to the stable 4.14.y
>>> series, hence the provenance as is.
>>
>> The format like stable would suggest some stable but then not clearly which
>> one. I realize that the stable series patches are done without that. But
>> then at least have a tracking bug that tellls from where things come and
>> also have a final commit which shows the upstream heritage.
>> Information from the cover email gets lost in the tree itself. And take some
>> comments as the pick was done before actually landing in 4.14.y. In this
>> case I probably still would have added cherry pick lines but saying
>> something from linux4.14.y submission). So we retrain the special way of
>> getting them.
> 
> What about a Link: pointing out to lore, as upstream has been using? That would
> be one step further than using the Message-ID, as those links include those.

Anything that reminds us about where something came from within the 
commit itself is good. Just not get into a situation where we ask 
ourselves where the heck this came from.
> 
> In this particular case, there is where they came from, a mailbox, not a git
> repo, so there would be no SHA1 to use, except one I created myself when
> applying the fix myself.
> 
> Cascardo.
> 
>>>
>>> Just like with the other changes that come from upstream stable, this works
>>> (and should, otherwise it would fail with those changes) for our tooling.
>>>
>>> And since these are targeted to be released before May 31st, when Bionic goes
>>> into ESM, I opted to handle this as usual.
>>>
>>> Cascardo.
>>
>> -- 
>> - Stefan
>>
> 
> 
> 
> 
> 

-- 
- Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 44613 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230517/167593da/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230517/167593da/attachment-0001.sig>


More information about the kernel-team mailing list